Tag Archives: Features

How we learned to break down barriers to machine learning

reader comments 0 with 0 posters participating Share this story Dr. Sephus discusses breaking down barriers to machine learning at Ars Frontiers 2022. Click here for transcript. Welcome to the week after Ars Frontiers! This article is the first in a short series of pieces that will recap each of the day’s talks for the… Read More »

New Bluetooth hack can unlock your Tesla—and all kinds of other devices

Getty Images reader comments 52 with 39 posters participating, including story author Share this story When you use your phone to unlock a Tesla, the device and the car use Bluetooth signals to measure their proximity to each other. Move close to the car with the phone in hand, and the door automatically unlocks. Move… Read More »

How Apple, Google, and Microsoft will kill passwords and phishing in one stroke

Getty Images reader comments 186 with 108 posters participating, including story author Share this story For more than a decade, we’ve been promised that a world without passwords is just around the corner, and yet year after year, this security nirvana proves out of reach. Now, for the first time, a workable form of passwordless… Read More »

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus

Getty Images reader comments 95 with 73 posters participating, including story author Share this story A developer has been caught adding malicious code to a popular open-source package that wiped files on computers located in Russia and Belarus as part of a protest that has enraged many users and raised concerns about the safety of… Read More »

Attackers can force Amazon Echos to hack themselves with self-issued commands

Enlarge / A group of Amazon Echo smart speakers, including Echo Studio, Echo, and Echo Dot models. (Photo by Neil Godwin/Future Publishing via Getty Images) T3 Magazine/Getty Images reader comments 19 with 14 posters participating Share this story Academic researchers have devised a new working exploit that commandeers Amazon Echo smart speakers and forces them… Read More »

Securing your digital life, the finale: Debunking worthless “security” practices

Enlarge / Take one daily to keep Evil Hackerman away! reader comments 233 with 132 posters participating, including story author Share this story Securing your digital life View more stories Information security and privacy suffer from the same phenomenon we see in fighting COVID-19: “I’ve done my own research” syndrome. Many security and privacy practices… Read More »

Securing your digital life, part three: How smartphones make us vulnerable

Enlarge / In this story, we’re going to learn about “pig butchering.” Aurich Lawson / Getty Images reader comments 4 with 4 posters participating Share this story Securing your digital life View more stories There are, by some estimates, more smart phones on this planet than human beings to use them. People who have never… Read More »

What a “converged battlefield” means to the future of air… I mean, joint warfare

Enlarge / A three-ship flight of F-22 Raptors. As one of the US Air Force’s most sophisticated fighters, it might see combat in the future not against insurgencies, but against technologically sophisticated adversaries like China or Russia. Stocktrek Images / Getty Images reader comments 122 with 61 posters participating Share this story With the war… Read More »

Securing your digital life, part two: The bigger picture—and special circumstances

ANDRZEJ WOJCICKI / SCIENCE PHOTO LIBRARY / Getty Images reader comments 49 with 43 posters participating Share this story Securing your digital life View more stories In the first half of this guide to personal digital security, I covered the basics of assessing digital risks and protecting what you can control: your devices. But the… Read More »